Cover image for CISSP : certified information systems security professional study guide
Title:
CISSP : certified information systems security professional study guide
Personal Author:
Edition:
4th ed.
Publication Information:
Indianapolis, IN : Wiley Publishing, 2008
Physical Description:
xliv, 841 p. : ill. ; 24 cm. + 1 CD-ROM (12 cm.)
ISBN:
9780470276884
General Note:
Accompanied by CD-ROM : CP 015609

Available:*

Library
Item Barcode
Call Number
Material Type
Item Category 1
Status
Searching...
30000010189932 QA76.3 S57 2008 Open Access Book Book
Searching...

On Order

Summary

Summary

Building on the popular Sybex Study Guide approach, CISSP: Certified Information Systems Security Professional Study Guide, 4th Edition provides 100% coverage of the CISSP Body of Knowledge exam objectives. Find clear and concise information on crucial security topics, practical examples and insights drawn from real-world experience, and cutting-edge exam preparation software, including two full-length bonus exams and electronic flashcards. Prepare yourself by reviewing the key exam topics, including access control, application security, business continuity and disaster recovery planning, cryptography; information security and risk management, and security architecture and design telecommunications and network security.


Author Notes

James Michael Stewart , CISSP, has been writing and training for more than 14 years, with a current focus on security. He has taught dozens of CISSP training courses, not to mention numerous sessions on Windows security and the Certified Ethical Hacker certification. He is the author of several books and courseware sets on security certification, Microsoft topics, and network administration. More information about Michael can be found at his website: www.impactonline.com

Ed Tittel is a full-time freelance writer, trainer, and consultant specializing in matters related to information security, markup languages, and networking technologies. He is a regular contributor to numerous TechTarget websites; teaches online security and technology courses for companies including HP, Sony, and Motorola; and writes regularly for Tom's Hardware. Ed's professional bio and other information are available at www.edtittel.com

Mike Chapple , CISSP, is an IT security professional with the University of Notre Dame. In the past, he was chief information officer of Brand Institute and an information security researcher with the National Security Agency and the U.S. Air Force. His primary areas of expertise include network intrusion detection and access controls. Mike is a frequent contributor to TechTarget's SearchSecurity site, a technical editor for Information Security magazine, and the author of several information security titles including The GSEC Prep Guide from Wiley and Information Security Illuminated from Jones and Bartlett Publishers.


Table of Contents

Introduction
Assessment Test
Chapter 1 Accountability and Access Control
Chapter 2 Attacks and Monitoring
Chapter 3 ISO Model, Protocols, Network Security, and Network Infrastructure
Chapter 4 Communications Security and Countermeasures
Chapter 5 Security Management Concepts and Principles
Chapter 6 Asset Value, Policies, and Roles
Chapter 7 Data and Application Security Issues
Chapter 8 Malicious Code and Application Attacks
Chapter 9 Cryptography and Private Key Algorithms
Chapter 10 PKI and Cryptographic Applications
Chapter 11 Principles of Computer Design
Chapter 12 Principles of Security Models
Chapter 13 Administrative Management
Chapter 14 Auditing and Monitoring
Chapter 15 Business Continuity Planning
Chapter 16 Disaster Recovery Planning
Chapter 17 Law and Investigations
Chapter 18 Incidents and Ethics
Chapter 19 Physical Security Requirements
Appendix: About the Companion CD
Glossary
Index